CVE-2021-30934

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Nov 2023, 03:33

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/', 'name': 'FEDORA-2022-25a98f5d55', 'tags': ['Issue Tracking', 'Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/', 'name': 'FEDORA-2022-f7366e60cb', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ -
References (MLIST) http://www.openwall.com/lists/oss-security/2022/01/21/2 - Issue Tracking, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/01/21/2 -
References (MISC) https://support.apple.com/en-us/HT212980 - Vendor Advisory () https://support.apple.com/en-us/HT212980 -
References (MISC) https://support.apple.com/en-us/HT212975 - Vendor Advisory () https://support.apple.com/en-us/HT212975 -
References (DEBIAN) https://www.debian.org/security/2022/dsa-5060 - Issue Tracking, Third Party Advisory () https://www.debian.org/security/2022/dsa-5060 -
References (MISC) https://support.apple.com/en-us/HT212978 - Vendor Advisory () https://support.apple.com/en-us/HT212978 -
References (MISC) https://support.apple.com/en-us/HT212976 - Vendor Advisory () https://support.apple.com/en-us/HT212976 -
References (MISC) https://support.apple.com/en-us/HT212982 - Vendor Advisory () https://support.apple.com/en-us/HT212982 -
References (DEBIAN) https://www.debian.org/security/2022/dsa-5061 - Issue Tracking, Third Party Advisory () https://www.debian.org/security/2022/dsa-5061 -

Information

Published : 2021-08-24 19:15

Updated : 2024-02-28 18:28


NVD link : CVE-2021-30934

Mitre link : CVE-2021-30934

CVE.ORG link : CVE-2021-30934


JSON object : View

Products Affected

debian

  • debian_linux

apple

  • iphone_os
  • watchos
  • ipados
  • tvos
  • macos
  • safari

fedoraproject

  • fedora
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')